Awesome Hacking
A collection of awesome lists for hackers, pentesters & security researchers.
Your contributions are always welcome !
Awesome Repositories
Repository Description
Android Security Collection of Android security related resources
AppSec Resources for learning about application security
List of resources which help during asset discovery
Asset Discovery
phase of a security assessment engagement
List of Bug Bounty Programs and write-ups from the
Bug Bounty
Bug Bounty hunters
Vagrant+Ansible virtual network penetration testing
Capsulecorp
lab. Companion to "The Art of Network Penetration
Pentest
Testing" by Royce Davis
List of CTF frameworks, libraries, resources and
CTF
softwares
Curated list of hacking environments where you can
Cyber Skills
train your cyber skills legally and safely
List of awesome DevSecOps tools with the help from
DevSecOps
community experiments and contributions
Embedded and IoT A curated list of awesome resources about embedded
Security and IoT security
Exploit
Resources for learning about Exploit Development
Development
Fuzzing List of fuzzing resources for learning Fuzzing and initial
Repository Description
phases of Exploit Development like root cause analysis
Hacking List of awesome Hacking tutorials, tools and resources
Collection of hacking / penetration testing resources to
Hacking Resources
make you better!
Honeypots List of honeypot resources
Incident Response List of tools for incident response
Industrial Control List of resources related to Industrial Control System
System Security (ICS) security
InfoSec List of awesome infosec courses and training resources
IoT Hacks Collection of Hacks in IoT Space
List of Awesome Mainframe Hacking/Pentesting
Mainframe Hacking
Resources
Malware Analysis List of awesome malware analysis tools and resources
List of amazingly awesome Open Source Intelligence
OSINT
(OSINT) tools and resources
OSX and iOS
OSX and iOS related security tools
Security
Collection of tools developed by researchers in the
Pcaptools
Computer Science area to process network traces
Pentest List of awesome penetration testing resources, tools
Repository Description
and other shiny things
Libraries for generating secure random numbers,
PHP Security
encrypting data and scanning for vulnerabilities
Red Teaming List of Awesome Red Team / Red Teaming Resources
Reversing List of awesome reverse engineering resources
Sec Talks List of awesome security talks
Collection of multiple types of lists used during security
SecLists
assessments
Collection of awesome software, libraries, documents,
Security
books, resources and cools stuffs about security
Serverless Security Collection of Serverless security related resources
Social Engineering List of awesome social engineering resources
List of static analysis tools, linters and code quality
Static Analysis
checkers for various programming languages
The Art of Hacking List of resources includes thousands of cybersecurity-
Series related references and resources
Threat Intelligence List of Awesome Threat Intelligence resources
List of resources for learning about vehicle security and
Vehicle Security
car hacking
Vulnerability List of resources about Vulnerability Research
Repository Description
Research
Web Hacking List of web application security
Windows
List of Awesome Advanced Windows Exploitation
Exploitation -
References
Advanced
WiFi Arsenal Pack of various useful/useless tools for 802.11 hacking
YARA List of awesome YARA rules, tools, and people
A guide for amateur pen testers and a collection of
Hacker Roadmap hacking tools, resources and references to practice
ethical hacking.
Other useful repositories
Repository Description
Adversarial Machine Curated list of awesome adversarial machine
Learning learning resources
AI Security Curated list of AI security resources
Checklist of the most important security
API Security Checklist countermeasures when designing, testing, and
releasing your API
Various public documents, whitepapers and
APT Notes
articles about APT campaigns
Bug Bounty Reference List of bug bounty write-up that is categorized
Repository Description
by the bug nature
Cryptography Cryptography resources and tools
List of Capture The Flag (CTF) frameworks,
CTF Tool
libraries, resources and softwares
CVE PoC List of CVE Proof of Concepts (PoCs)
Vagrant & Packer scripts to build a lab
Detection Lab environment complete with security tooling and
logging best practices
List of awesome forensic analysis tools and
Forensics
resources
Free Programming Books Free programming books for developers
Gray Hacker Resources Useful for CTFs, wargames, pentesting
A curated list of Unix binaries that can be
GTFOBins exploited by an attacker to bypass local security
restrictions
Hacker101 A free class for web security by HackerOne
A collection of resources, documentation, links,
Infosec Getting Started
etc to help people learn about Infosec
Information Security Reference That Doesn't
Infosec Reference
Suck
IOC Collection of sources of indicators of
Repository Description
compromise
A bunch of links related to Linux kernel fuzzing
Linux Kernel Exploitation
and exploitation
Resources relating to the security and
Lockpicking
compromise of locks, safes, and keys.
Machine Learning for Curated list of tools and resources related to the
Cyber Security use of machine learning for cyber security
Payloads Collection of web attack payloads
List of useful payloads and bypass for Web
PayloadsAllTheThings
Application Security and Pentest/CTF
Collection of the cheat sheets useful for
Pentest Cheatsheets
pentesting
A free online security knowledge library for
Pentest Wiki
pentesters / researchers
Wordlists sorted by probability originally created
Probable Wordlists
for password generation and testing
Collection of useful GitHub projects loosely
Resource List
categorised
List of Reverse Engineering articles, books, and
Reverse Engineering
papers
Collection of Radio Frequency Communication
RFSec-ToolKit
Protocol Hacktools
Repository Description
Collection of cheatsheets for various infosec
Security Cheatsheets
tools and topics
Security List Great security list for fun and profit
List of awesome command-line frameworks,
Shell toolkits, guides and gizmos to make complete
use of shell
A Threat hunter's playbook to aid the
ThreatHunter-Playbook development of techniques and hypothesis for
hunting campaigns
Curated list of Web Security materials and
Web Security
resources
Pre-Built Vulnerable Environments Based on
Vulhub
Docker-Compose